SlideShare a Scribd company logo
GCC CYBER-SECURITY SUMMIT WILL TACKLE
GROWING THREAT TO REGIONAL DATA SAFETY
September Forum in Abu Dhabi to Focus on Protection
from Cyber-Attack, Terrorism and Criminal Fraud
Former Director of US Federal Emergency Management
Agency (FEMA) Heads Panel of Top Experts
The GCC CYBER-SECURITY SUMMIT, which takes place in Abu
Dhabi from 13-15 September 2015, will bring together top
international and regional security experts in response to a vital
threat against the region’s future well-being: cyber-attack.
US intelligence officials recently stated that cyber-crime currently
trumps terrorism as the biggest threat to the USA’s security. Last
year alone, 88% of US stock brokerages and 74% of money-
management firms were victims of cyber-attacks – either directly
or through a vendor.
The Gulf has not been spared. Research by Kaspersky Lab shows that the UAE ranks second in
the GCC, and around 15th
globally, in suffering from online threats and attacks. Not surprisingly,
authoritative research house Gartner records a current value of $23 billion for the Middle East
cyber-security market: a figure set to grow exponentially.
The wealth and resources of the six GCC nations are now viewed as rich pickings– among a
shadowy fraternity that is only growing in size and menace.
Those charged with protecting national and company security are increasingly asking
themselves two specific questions: What are the true, current threat perspectives, here in the
GCC? Where are the ever-evolving strategic solutions necessary to protect our governments and
economies?
The GCC CYBER-SECURITY SUMMIT at the Abu Dhabi Beach Rotana Hotel will bring together
highly influential international and regional cyber-authorities to provide robust guidance and
analysis on these strategic issues. Advisory Board members and speakers will network with a
distinguished audience of CEOs, COOs, CSO, CIOs, CTOs, Security Experts, Financial Crime
Advisers and Telecoms Managers.
Michael D Brown, Former Director of FEMA (the US Federal Emergency Management
Agency) who will be a keynote speaker, said last week: “The UAE has been a staunch partner of
the USA in key areas of international security – most recently in the struggle against ISIL
terrorism in Iraq and Syria.
“A more insidious threat to the entire Arab Gulf is cyber-attack. It makes just as much impact
on society as the bomber or the assassin.”
Joining Michael Brown on the Summit Advisory Board will be Dr Jonathan Reichental, CIO
of the City of Palo Alto in California. Dr Reichental, former winner of the “Best CIO in Silicon
Valley” Award, commented: "Creating and executing a comprehensive cyber-security strategy
has to be at the top of any leader’s agenda now. This isn't a nice-to-have, this is essential
work."
Confirmed members of the Honorary Advisory Board, who will be speaking at the Summit,
include: Ibrahim Al Mallouhi, Vice-President – Security Operations, Du Telecom; Patrick
MacGloin, Director & Cyber-Security Lead MENA, PriceWaterhouseCoopers (PWC); Billa
Bhandari, Director, Cybersecurity & Biometrics SME; Mr Brown and Dr Reichenthal.
They – and more than 20 other specialists – will examine regional threat perceptions, risks and
solutions. They will assess how attacks on critical regional infrastructure have been and should
be handled: above all, they will explain how best to ensure secure government and business
continuity in the face of ever-increasing levels of criminal espionage and hacking.
As Michael Brown summed up: “We need, above all, to correctly understand the nature of the
threats facing the region as it seeks long term protection for its critical communications
infrastructure.”
The GCC CYBER-SECURITY SUMMIT is organised by TMC Conferences of Dubai – creators of
the recent and well-received GCC BIG DATA SUMMIT held in Dubai during March.
The conference programme, with topics, is available on the GCC CYBER-SECURITY SUMMIT
website, www.gcc-cybersecurity.com
OR call TMC on: +971 4 276 5409; E-mail: info@gcc-cybersecurity.com
Ends
____________________________
For further information, please contact:
Stefan Kemball
Director of Strategy, TMC
Tel: +971 4 276 5409
Email: stefan@tmc-me.com
Web: www.tmc-me.com
 Read about the event programme, advisory board, delegate booking and sponsorship
opportunities at www.gcc-cybersecurity.com
News release 1   gcc cyber security - 150413

More Related Content

What's hot

Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
FalconPeregrine1
 
F5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus GroupF5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus Group
F5 Networks
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Maurice Dawson
 
Cybersec
CybersecCybersec
Cybersec
jumanne rajabu
 
Cyber Risk Exposure Scorecard
Cyber Risk Exposure ScorecardCyber Risk Exposure Scorecard
Cyber Risk Exposure Scorecard
Haley Saalsaa
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
Brunswick Group
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
assanesignate
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
Paul van Heel
 
Pa862
Pa862Pa862
B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6
RobertHannigan5
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
CODE BLUE
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysis
G3 intelligence Ltd
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
Jeremiah Grossman
 

What's hot (14)

Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
F5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus GroupF5 Networks Hacktivism Focus Group
F5 Networks Hacktivism Focus Group
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Cybersec
CybersecCybersec
Cybersec
 
Cyber Risk Exposure Scorecard
Cyber Risk Exposure ScorecardCyber Risk Exposure Scorecard
Cyber Risk Exposure Scorecard
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Pa862
Pa862Pa862
Pa862
 
B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6
 
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysis
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 

Similar to News release 1 gcc cyber security - 150413

Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
TopCyberNewsMAGAZINE
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
David Sweigert
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
CSO_Presentations
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
Supply Chain Coalition
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
BlackBerry
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
Syed Faizuddin Alim
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
itnewsafrica
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
Spark Security
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
hallettfaustina
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
Mohamed N. El-Guindy
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
Chuck Brooks
 
Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
Nirenj George
 
Focus on global effort to ensure cybersecurity: Dyman Associates Management
Focus on global effort to ensure cybersecurity: Dyman Associates ManagementFocus on global effort to ensure cybersecurity: Dyman Associates Management
Focus on global effort to ensure cybersecurity: Dyman Associates Management
gerlkee
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
sunnyjoshi88
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
MarioEliseo3
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
ITnation Luxembourg
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 

Similar to News release 1 gcc cyber security - 150413 (20)

Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
 
Focus on global effort to ensure cybersecurity: Dyman Associates Management
Focus on global effort to ensure cybersecurity: Dyman Associates ManagementFocus on global effort to ensure cybersecurity: Dyman Associates Management
Focus on global effort to ensure cybersecurity: Dyman Associates Management
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 

Recently uploaded

Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 

Recently uploaded (20)

Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 

News release 1 gcc cyber security - 150413

  • 1. GCC CYBER-SECURITY SUMMIT WILL TACKLE GROWING THREAT TO REGIONAL DATA SAFETY September Forum in Abu Dhabi to Focus on Protection from Cyber-Attack, Terrorism and Criminal Fraud Former Director of US Federal Emergency Management Agency (FEMA) Heads Panel of Top Experts The GCC CYBER-SECURITY SUMMIT, which takes place in Abu Dhabi from 13-15 September 2015, will bring together top international and regional security experts in response to a vital threat against the region’s future well-being: cyber-attack. US intelligence officials recently stated that cyber-crime currently trumps terrorism as the biggest threat to the USA’s security. Last year alone, 88% of US stock brokerages and 74% of money- management firms were victims of cyber-attacks – either directly or through a vendor. The Gulf has not been spared. Research by Kaspersky Lab shows that the UAE ranks second in the GCC, and around 15th globally, in suffering from online threats and attacks. Not surprisingly, authoritative research house Gartner records a current value of $23 billion for the Middle East cyber-security market: a figure set to grow exponentially. The wealth and resources of the six GCC nations are now viewed as rich pickings– among a shadowy fraternity that is only growing in size and menace. Those charged with protecting national and company security are increasingly asking themselves two specific questions: What are the true, current threat perspectives, here in the GCC? Where are the ever-evolving strategic solutions necessary to protect our governments and economies? The GCC CYBER-SECURITY SUMMIT at the Abu Dhabi Beach Rotana Hotel will bring together highly influential international and regional cyber-authorities to provide robust guidance and analysis on these strategic issues. Advisory Board members and speakers will network with a distinguished audience of CEOs, COOs, CSO, CIOs, CTOs, Security Experts, Financial Crime Advisers and Telecoms Managers. Michael D Brown, Former Director of FEMA (the US Federal Emergency Management Agency) who will be a keynote speaker, said last week: “The UAE has been a staunch partner of the USA in key areas of international security – most recently in the struggle against ISIL terrorism in Iraq and Syria.
  • 2. “A more insidious threat to the entire Arab Gulf is cyber-attack. It makes just as much impact on society as the bomber or the assassin.” Joining Michael Brown on the Summit Advisory Board will be Dr Jonathan Reichental, CIO of the City of Palo Alto in California. Dr Reichental, former winner of the “Best CIO in Silicon Valley” Award, commented: "Creating and executing a comprehensive cyber-security strategy has to be at the top of any leader’s agenda now. This isn't a nice-to-have, this is essential work." Confirmed members of the Honorary Advisory Board, who will be speaking at the Summit, include: Ibrahim Al Mallouhi, Vice-President – Security Operations, Du Telecom; Patrick MacGloin, Director & Cyber-Security Lead MENA, PriceWaterhouseCoopers (PWC); Billa Bhandari, Director, Cybersecurity & Biometrics SME; Mr Brown and Dr Reichenthal. They – and more than 20 other specialists – will examine regional threat perceptions, risks and solutions. They will assess how attacks on critical regional infrastructure have been and should be handled: above all, they will explain how best to ensure secure government and business continuity in the face of ever-increasing levels of criminal espionage and hacking. As Michael Brown summed up: “We need, above all, to correctly understand the nature of the threats facing the region as it seeks long term protection for its critical communications infrastructure.” The GCC CYBER-SECURITY SUMMIT is organised by TMC Conferences of Dubai – creators of the recent and well-received GCC BIG DATA SUMMIT held in Dubai during March. The conference programme, with topics, is available on the GCC CYBER-SECURITY SUMMIT website, www.gcc-cybersecurity.com OR call TMC on: +971 4 276 5409; E-mail: info@gcc-cybersecurity.com Ends ____________________________ For further information, please contact: Stefan Kemball Director of Strategy, TMC Tel: +971 4 276 5409 Email: stefan@tmc-me.com Web: www.tmc-me.com  Read about the event programme, advisory board, delegate booking and sponsorship opportunities at www.gcc-cybersecurity.com